[Copyright notice]

These plenary speeches discuss the following: economics and information theory; a bit of output quantization and of convexity; and towards Google-like search on spoken documents with zero resources.
View full abstract»

The purpose of this article is to examine the greedy adaptive measurement policy in the context of a linear Guassian measurement model with an optimization criterion based on information gain. In the special case of sequential scalar measurements, we provide sufficient conditions under which the greedy policy actually is optimal in the sense of maximizing the net information gain. In the general s...
View full abstract»

As an extension of the linear discriminant analysis (LDA), the kernel discriminant analysis (KDA) generally results in good pattern recognition performance for both small sample size (SSS) and non-SSS problems. Yet, the original scheme based on the eigen-decomposition technique suffers from a complexity burden. In this paper, by transforming the problem of finding the feature extractor (FE) of the...
View full abstract»

It is already known that the superposition property of wireless multiple-access channels can profitably be exploited for computing linear functions of the measurements in sensor networks. If appropriate pre- and post-processing functions are employed to operate on sensor readings and the superimposed signal received by a fusion center, respectively, then every function of the measurements is essen...
View full abstract»

This paper discusses the performance of complex blind source separation via the FastICA algorithm. In particular, we show that the optimum nonlinearity for the algorithm can be derived from the common source distribution. In addition, this nonlinearity can be further approximated by a piecewise constant quantizer to reduce the complexity of the system. These results are obtained with an approach b...
View full abstract»

To improve the performance of nonlinear RF power amplifiers, either in terms of spectrum control or constellation quality, digital predistortion has become an attractive alternative to the simple approach of `backing off' the amplifier into a quasi-linear region of operation. This allows more efficient use of the amplifier in both RF output and DC power consumption. In this paper, we formulate a s...
View full abstract»

In this paper, we analyze the information theoretic aspects of the phenomenon of stochastic resonance in terms of the algebraic properties of the channel matrix. The binary-input binary-output channel model under discussion is a threshold system. We offer an algebraic view of Kosko's Forbidden Interval Theorem, and extend his result in certain cases.
View full abstract»

The Cross Ambiguity Function (CAF) used in signal location estimation is a 2-dimensional complex-valued function of TDOA and FDOA. In TDOA/FDOA systems, pairs of sensors share data to compute the CAF. In practice, the received signals are noisy and this noise perturbs the CAF from its ideal shape which is a big main lobe and some small side lobes. At low SNRs, the CAF main lobe is buried in the no...
View full abstract»

In this work, we consider the problem of communicating linear functions of correlated Gaussian sources over a two-user additive Gaussian noise multiple access channel (MAC) in the presence of known interference at the transmitter. The goal is to estimate a linear combination of two sources at the receiver with minimum average mean squared error (MSE) distortion. Here, a lattice-based coding scheme...
View full abstract»

In this paper, we consider energy efficient transmissions for MIMO cognitive radio networks in which the secondary users coexist with the primary users. We want to optimize the proper time allocations and the beamforming vectors for the secondary users, in order to minimize the total energy consumption of the secondary users while satisfying secondary users' rate requirements and the primary recei...
View full abstract»

This paper introduces a method for mixture model-based classifier domain adaptation, wherein one has adequate labeled training data for one (source) domain, very scarce labeled data for another (target) domain, and where the discrepancy between the source and target domain class-conditional distributions is not “too great”. Starting from the source domain classifier parameters, the method maximize...
View full abstract»

Recently, semiconductor optical amplifiers (SOAs) have attracted much attention as potential candidates for active photonic circuits. In this paper, a Volterra series for the input-output map of such a device is derived using an existing nonlinear state space model. A second-order Volterra approximation is then compared in a specific instance against the full nonlinear model and a linearized model...
View full abstract»

In classical TDOA/FDOA emitter location methods, pairs of sensors share the received data to compute the CAF and extract the ML estimates of TDOA/FDOA. The TDOA/FDOA estimates are then transmitted to a common site where they are used to estimate the emitter location. However, the two-stage method is not necessarily optimal because in the first stage of these methods, the TDOA and FDOA are estimate...
View full abstract»

Due to the exponentially-increasing energy consumption of wireless mobile networks, energy efficiency has become an important metric in designing these networks. In this paper, we present an analysis of the energy efficiency of best-select relaying, where a single best relay is chosen to relay the source message, and compare its performance with direct communication. To improve the energy efficien...
View full abstract»

In this paper, we use rate distortion theory to investigate the overhead-performance tradeoff for relay selection in cooperative communications. Existing research is usually highly dependent on the specific implementation approaches. Our analysis, instead, studies the general and fundamental question: how much extra information is required for relay selection? The theoretical analysis for the rate...
View full abstract»

An orthogonal components relay channel subject to structured interference is studied. Modeling interference as a structured signal is accurate for scenarios in which the interferer is another source communicating with its own destination. It is assumed that interference is known non-causally at the source and the relay is used for both forwarding the source message and for cooperative interference...
View full abstract»

This paper investigates quantization of the channel state information (CSI) in a cooperative cellular network. This CSI, delivered to some central node, is to be used to allocate resources in order to maximize the sum-rate in a multi-source network assisted by multiple relays. We start by deriving tight bounds on the performance loss due to quantization and then, through minimizing these bounds, w...
View full abstract»

Data rates and channel capacity in MIMO-OFDM wireless systems can be improved through the use of Adaptive Modulation and Coding (AMC) and pattern reconfigurable antennas. In this paper, we propose a Spatially Adaptive Modulation and Coding (SAMC) scheme that operates in two stages. In the first, it searches for the optimal antenna configuration. Then, the technique applies AMC based on the post-pr...
View full abstract»

Learning curves of the complex proportionate-type normalized least mean square (CPtNLMS), simplified CPtNLMS, and one-gain CPtNLMS algorithms are compared for different complex input signals and complex impulse responses. Cases when the algorithms show different behaviors are presented. In addition the water-filling algorithm for optimal adaptation gain allocation is extended from real-valued sign...
View full abstract»

A novel random access protocol for data collection from a set of energy harvesting (EH) capable wireless nodes is proposed. The scheme is a variant of the dynamic framed ALOHA (DFA) protocol, tailored to EH networks. The proposed scheme, referred to as energy group-DFA (EG-DFA), is based on the observation that, when DFA is operated with EH-capable nodes, the optimal number of slots in a frame (i....
View full abstract»

In this paper, a unified analytical model is established to analyze the throughput performance of M-group heterogeneous IEEE 802.11 DCF networks with a distinct input rate, number of nodes and initial backoff window size in each group. Steady-state points under unsaturated, partially-saturated and fully-saturated scenarios are characterized, and the maximum throughput is derived. Explicit expressi...
View full abstract»

Power line communication (PLC) continues to draw increasing interest with a potential for a wide range of applications including cost-free last-mile communication solution and smart grid monitoring. However, signals transmitted through the power lines deteriorate badly due to the presence of severe inter-symbol interference (ISI) and harsh impulsive noise. This work studies reliable communication ...
View full abstract»